Of lesser importance, if you’ve taken the necessary steps to hide the Nav Pane altogether, changing the individual object Hidden attribute to True (so as to make it a hidden object) can keep most users from viewing objects in the first place unless they purposely go and changes their Navigation Display Options to Show Hidden Objects. As such, by simply hiding the Navigation Pane, you eliminate your user’s ability to access these database objects. Hide the Navigation PaneĪs noted in the previous section, an mde/accde surprisingly does not lock down tables, queries or macros so it becomes critical to take the necessary steps to do as much as you can to limit users abilities to get into aspects of the databases they shouldn’t be in. Now an mde/accde surprisingly does not lock down tables, queries or macros.Īlso note that since all VBA code is locked down and unviewable, any unhandled errors will cause a fatal application crash, hence the crucial importance of bulletproof error handling throughout all of your VBA code. So in essence by distributing a compile version you minimize any opportunity to mess around with the database itself. Users can not open Forms or Reports in design view, nor can the view any of the VBA code. By converting your mdb/accdb into an mde/accde, you lock down certain type of objects within your database. Distribute a Compiled FE to your End-UsersĪnother critical step is to always distribute a compiled version (mde/accde) of your FE to your end-users. This will, in the very least, stop prying eyes from being able to harvest BE passwords allowing anyone to have complete reign on your raw data.Īlso, be sure to use a different password for the FE than used with the BE. As such, like your back-end (BE), you should always Encrypt with Password your front-end (FE). ![]() ![]() Password Protect your FEĪs I pointed out in my post entitled Why Ms Access Isn’t A Secure Database – Part 2, a MS Access Front-End is not secure and leaves sensitive information completely open to hacking. In this post I’d like to discuss what steps you can take to try and secure, as best you can, your MS Access Front-End application.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |